In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d...In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely correct.Formal verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented correctly.In this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly instructions.The verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations.展开更多
Objective:To apply and verify the application of intelligent audit rules for urine analysis by Cui et al.Method:A total of 1139 urine samples of hospitalized patients in Tai’an Central Hospital from September 2021 to...Objective:To apply and verify the application of intelligent audit rules for urine analysis by Cui et al.Method:A total of 1139 urine samples of hospitalized patients in Tai’an Central Hospital from September 2021 to November 2021 were randomly selected,and all samples were manually microscopic examined after the detection of the UN9000 urine analysis line.The intelligent audit rules(including the microscopic review rules and manual verification rules)were validated based on the manual microscopic examination and manual audit,and the rules were adjusted to apply to our laboratory.The laboratory turnaround time(TAT)before and after the application of intelligent audit rules was compared.Result:The microscopic review rate of intelligent rules was 25.63%(292/1139),the true positive rate,false positive rate,true negative rate,and false negative rate were 27.66%(315/1139),6.49%(74/1139),62.34%(710/1139)and 3.51%(40/1139),respectively.The approval consistency rate of manual verification rules was 84.92%(727/856),the approval inconsistency rate was 0%(0/856),the interception consistency rate was 12.61%(108/856),and the interception inconsistency rate was 0%(0/856).Conclusion:The intelligence audit rules for urine analysis by Cui et al.have good clinical applicability in our laboratory.展开更多
The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules...The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules can be translated into machine language and used by autonomous vehicles.In this paper,a translation flow is designed.Beyond the translation,a deeper examination is required,because the semantics of natural languages are rich and complex,and frequently contain hidden assumptions.The issue of how to ensure that digital rules are accurate and consistent with the original intent of the traffic rules they represent is both significant and unresolved.In response,we propose a method of formal verification that combines equivalence verification with model checking.Reasonable and reassuring digital traffic rules can be obtained by utilizing the proposed traffic rule digitization flow and verification method.In addition,we offer a number of simulation applications that employ digital traffic rules to assess vehicle violations.The experimental findings indicate that our digital rules utilizing metric temporal logic(MTL)can be easily incorporated into simulation platforms and autonomous driving systems(ADS).展开更多
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems...Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.展开更多
Recent advancements in satellite technologies and the declining cost of access to space have led to the emergence of large satellite constellations in Low Earth Orbit(LEO).However,these constellations often rely on be...Recent advancements in satellite technologies and the declining cost of access to space have led to the emergence of large satellite constellations in Low Earth Orbit(LEO).However,these constellations often rely on bent-pipe architecture,resulting in high communication costs.Existing onboard inference architectures suffer from limitations in terms of low accuracy and inflexibility in the deployment and management of in-orbit applications.To address these challenges,we propose a cloud-native-based satellite design specifically tailored for Earth Observation tasks,enabling diverse computing paradigms.In this work,we present a case study of a satellite-ground collaborative inference system deployed in the Tiansuan constellation,demonstrating a remarkable 50%accuracy improvement and a substantial 90%data reduction.Our work sheds light on in-orbit energy,where in-orbit computing accounts for 17%of the total onboard energy consumption.Our approach represents a significant advancement of cloud-native satellite,aiming to enhance the accuracy of in-orbit computing while simultaneously reducing communication cost.展开更多
Online Signature Verification (OSV), as a personal identification technology, is widely used in various industries.However, it faces challenges, such as incomplete feature extraction, low accuracy, and computational h...Online Signature Verification (OSV), as a personal identification technology, is widely used in various industries.However, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toaddress these issues, we propose a novel approach for online signature verification, using a one-dimensionalGhost-ACmix Residual Network (1D-ACGRNet), which is a Ghost-ACmix Residual Network that combines convolutionwith a self-attention mechanism and performs improvement by using Ghost method. The Ghost-ACmix Residualstructure is introduced to leverage both self-attention and convolution mechanisms for capturing global featureinformation and extracting local information, effectively complementing whole and local signature features andmitigating the problem of insufficient feature extraction. Then, the Ghost-based Convolution and Self-Attention(ACG) block is proposed to simplify the common parts between convolution and self-attention using the Ghostmodule and employ feature transformation to obtain intermediate features, thus reducing computational costs.Additionally, feature selection is performed using the random forestmethod, and the data is dimensionally reducedusing Principal Component Analysis (PCA). Finally, tests are implemented on the MCYT-100 datasets and theSVC-2004 Task2 datasets, and the equal error rates (EERs) for small-sample training using five genuine andforged signatures are 3.07% and 4.17%, respectively. The EERs for training with ten genuine and forged signaturesare 0.91% and 2.12% on the respective datasets. The experimental results illustrate that the proposed approacheffectively enhances the accuracy of online signature verification.展开更多
Background:The purpose of the study was to investigate the active ingredients and potential biochemical mechanisms of Juanbi capsule in knee osteoarthritis based on network pharmacology,molecular docking and animal ex...Background:The purpose of the study was to investigate the active ingredients and potential biochemical mechanisms of Juanbi capsule in knee osteoarthritis based on network pharmacology,molecular docking and animal experiments.Methods:Chemical components for each drug in the Juanbi capsule were obtained from Traditional Chinese Medicine Systems Pharmacology Database and Analysis Platform,while the target proteins for knee osteoarthritis were retrieved from the Drugbank,GeneCards,and OMIM databases.The study compared information on knee osteoarthritis and the targets of drugs to identify common elements.The data was imported into the STRING platform to generate a protein-protein interaction network diagram.Subsequently,a“component-target”network diagram was created using the screened drug components and target information with Cytoscape software.Common targets were imported into Metascape for GO function and KEGG pathway enrichment analysis.AutoDockTools was utilized to predict the molecular docking of the primary chemical components and core targets.Ultimately,the key targets were validated through animal experiments.Results:Juanbi capsule ameliorated Knee osteoarthritis mainly by affecting tumor necrosis factor,interleukin1β,MMP9,PTGS2,VEGFA,TP53,and other cytokines through quercetin,kaempferol,andβ-sitosterol.The drug also influenced the AGE-RAGE,interleukin-17,tumor necrosis factor,Relaxin,and NF-κB signaling pathways.The network pharmacology analysis results were further validated in animal experiments.The results indicated that Juanbi capsule could decrease the levels of tumor necrosis factor-αand interleukin-1βin the serum and synovial fluid of knee osteoarthritis rats and also down-regulate the expression levels of MMP9 and PTGS2 proteins in the articular cartilage.Conclusion:Juanbi capsule may improve the knee bone microstructure and reduce the expression of inflammatory factors of knee osteoarthritis via multiple targets and multiple signaling pathways.展开更多
In conjunction with the working characteristics of the high-clearance wheeled sprayer and the benefits of the closed hydraulic system,a series of reasonable working parameters should be established,and a hydraulic sys...In conjunction with the working characteristics of the high-clearance wheeled sprayer and the benefits of the closed hydraulic system,a series of reasonable working parameters should be established,and a hydraulic system that fulfills the requisite specifications should be designed.The AMESim software model is employed to construct a closed hydraulic transmission system,and the simulation analysis is then performed according to the data of hydraulic components.According to analysis results,the prototype can be optimized and upgraded,and a verification test is further carried out.The test results demonstrate that the designed closed hydraulic transmission system meets the actual working requirements of the high-clearance wheeled sprayer and provides a stable experimental platform for intelligent control of agricultural machinery.展开更多
A secure operating system in the communication network can provide the stable working environment,which ensures that the user information is not stolen.The micro-kernel operating system in the communication network re...A secure operating system in the communication network can provide the stable working environment,which ensures that the user information is not stolen.The micro-kernel operating system in the communication network retains the core functions in the kernel,and unnecessary tasks are implemented by calling external processes.Due to the small amount of code,the micro-kernel architecture has high reliability and scalability.Taking the microkernel operating system in the communication network prototype VSOS as an example,we employ the objdump tool to disassemble the system source code and get the assembly layer code.On this basis,we apply the Isabelle/HOL,a formal verification tool,to model the system prototype.By referring to the mathematical model of finite automata and taking the process scheduling module as an example,the security verification based on the assembly language layer is developed.Based on the Hoare logic theory,each assembly statement of the module is verified in turn.The verification results show that the scheduling module of VSOS has good functional security,and also show the feasibility of the refinement framework.展开更多
Objective:To construct a risk prediction model for fall in patients with maintenance hemodialysis(MHD)and to verify the prediction effect of the model.Methods:From June 2020 to December 2020,307 patients who underwent...Objective:To construct a risk prediction model for fall in patients with maintenance hemodialysis(MHD)and to verify the prediction effect of the model.Methods:From June 2020 to December 2020,307 patients who underwent MHD in a tertiary hospital in Chengdu were divided into a fall group(32 cases)and a non-fall group(275 cases).Logistic regression analysis model was used to establish the influencing factors of the subjects.Hosmer–Lemeshow and receiver operating characteristic(ROC)curve were used to test the goodness of fit and predictive effect of the model,and 104 patients were again included in the application research of the model.Results:The risk factors for fall were history of falls in the past year(OR=3.951),dialysis-related hypotension(OR=6.949),time up and go(TUG)test(OR=4.630),serum albumin(OR=0.661),frailty(OR=7.770),and fasting blood glucose(OR=1.141).Hosmer–Lemeshow test was P=0.475;the area under the ROC curve was 0.907;the Youden index was 0.642;the sensitivity was 0.843;and the specificity was 0.799.Conclusions:The risk prediction model constructed in this study has a good effect and can provide references for clinical screening of fall risks in patients with MHD.展开更多
Plasma jet triggered gas gap switch has obvious advantages in fast control switch.The development of the plasma in the ambient medium is the key factor affecting the triggering conduction of the gas switch.However,the...Plasma jet triggered gas gap switch has obvious advantages in fast control switch.The development of the plasma in the ambient medium is the key factor affecting the triggering conduction of the gas switch.However,the plasma jet process and its characteristic parameters are complicated and the existing test methods cannot fully characterize its development laws.In this work,a two-dimensional transient fluid calculation model of the plasma jet process of the gas gap switch is established based on the renormalization-group k-εturbulence equation.The results show that the characteristic parameters and morphological evolution of the plasma jet are basically consistent with the experimental results,which verifies the accuracy of the simulation model calculation.The plasma jet is a long strip with an initial velocity of 1.0 km·s-1and develops in both axial and radial directions.The jet velocity fluctuates significantly with axial height.As the plasma jet enters the main gap,the pressure inside the trigger cavity drops by80%,resulting in a rapid drop in the jet velocity.When the plasma jet head interacts with the atmosphere,the two-phase fluid compresses each other,generating a forward-propelled pressure wave.The plasma jet heads flow at high velocity,a negative pressure zone is formed in the middle part of the jet,and the pressure peak decreases gradually with height.As the value of the inlet pressure increases,the characteristic parameters of the plasma jet increase.The entrainment phenomenon is evident,which leads to an increase in the pressure imbalance of the atmospheric gas medium,leading to a significant Coanda effect.Compared with air,the characteristic parameters of a plasma jet in SF6are lower,and the morphological evolution is significantly suppressed.The results of this study can provide some insight into the mechanism of action of the switch jet plasma development process.展开更多
The plasma optical boundary reconstruction technique based on Hommen's theory is promising for future tokamaks with high parameters. In this work, we conduct detailed analysis and simulation verification to estima...The plasma optical boundary reconstruction technique based on Hommen's theory is promising for future tokamaks with high parameters. In this work, we conduct detailed analysis and simulation verification to estimate the ‘logic loophole' of this technique. The finite-width effect and unpredictable errors reduce the technique's reliability, which leads to this loophole. Based on imaging theory, the photos of a virtual camera are simulated by integrating the assumed luminous intensity of plasma. Based on Hommen's theory, the plasma optical boundary is reconstructed from the photos. Comparing the reconstructed boundary with the one assumed, the logic loophole and its two effects are quantitatively estimated. The finite-width effect is related to the equivalent thickness of the luminous layer, which is generally about 2-4 cm but sometimes larger. The level of unpredictable errors is around 0.65 cm. The technique based on Hommen's theory is generally reliable, but finite-width effect and unpredictable errors have to be taken into consideration in some scenarios. The parameters of HL-2M are applied in this work.展开更多
Offline signature verification(OfSV)is essential in preventing the falsification of documents.Deep learning(DL)based OfSVs require a high number of signature images to attain acceptable performance.However,a limited n...Offline signature verification(OfSV)is essential in preventing the falsification of documents.Deep learning(DL)based OfSVs require a high number of signature images to attain acceptable performance.However,a limited number of signature samples are available to train these models in a real-world scenario.Several researchers have proposed models to augment new signature images by applying various transformations.Others,on the other hand,have used human neuromotor and cognitive-inspired augmentation models to address the demand for more signature samples.Hence,augmenting a sufficient number of signatures with variations is still a challenging task.This study proposed OffSig-SinGAN:a deep learning-based image augmentation model to address the limited number of signatures problem on offline signature verification.The proposed model is capable of augmenting better quality signatures with diversity from a single signature image only.It is empirically evaluated on widely used public datasets;GPDSsyntheticSignature.The quality of augmented signature images is assessed using four metrics like pixel-by-pixel difference,peak signal-to-noise ratio(PSNR),structural similarity index measure(SSIM),and frechet inception distance(FID).Furthermore,various experiments were organised to evaluate the proposed image augmentation model’s performance on selected DL-based OfSV systems and to prove whether it helped to improve the verification accuracy rate.Experiment results showed that the proposed augmentation model performed better on the GPDSsyntheticSignature dataset than other augmentation methods.The improved verification accuracy rate of the selected DL-based OfSV system proved the effectiveness of the proposed augmentation model.展开更多
The stability control of fissured rock is difficult,especially under static and dynamic loads in deep coal mines.In this paper,the dynamic mechanical properties,strain rate evolution and energy dissipation of fissured...The stability control of fissured rock is difficult,especially under static and dynamic loads in deep coal mines.In this paper,the dynamic mechanical properties,strain rate evolution and energy dissipation of fissured and anchored rocks were respectively obtained by SHPB tests.It was found that bolt can provide supporting efficiency-improving effect for fissured rock against dynamic disturbance,and this effect increased quadratically with decrease in anchoring angles.Then,the energy dissipation mechanism of anchored rock was obtained by slipping model.Furthermore,bolt energy-absorbing mechanism by instantaneous tensile-shear deformation was expressed based on material mechanics,which was the larger the anchoring angle,the smaller the energy absorption,and the less the contribution to supporting efficiency improvement.On this basis,the functional relationship between energy dissipation of anchored rock and energy absorption of bolt was established.Taking the coal-gangue separation system of Longgu coal mine as an example,the optimal anchoring angle can be determined as 57.5°–67.5°.Field monitoring showed fissured rock with the optimal anchoring angle,can not only effectively control the deformation,but also fully exert the energy-absorbing and efficiency-improving effect of bolt itself.This study provides guidance to the stability control and supporting design for deep engineering under the same or similar conditions.展开更多
Abstract: The major methods to investigate the airbags cushion system are experimental method, thermodynamic method and finite element method (FEM). Airbags cushion systems are very complicated and very difficult t...Abstract: The major methods to investigate the airbags cushion system are experimental method, thermodynamic method and finite element method (FEM). Airbags cushion systems are very complicated and very difficult to be investigated thoroughly by such methods For experimental method, it is nearly impossible to completely analyze and optimize the cushion characteristics of airbags of airborne vehicle because of charge issue, safety concern and time constraint. Thermodynamic method fails to take the non-linear effects of large airbag deformation and varied contact conditions into consideration. For finite element method, the FE model is usually complicated and the calculation takes tens of hours of CPU time. As a result, the optimization of the design based on a nonlinear model is very difficult by traditional iterative approach method. In this paper, a model based on FEM and control volume method is proposed to simulate landing cushion process of airborne vehicle with airbags cushion system in order to analyze and optimize the parameters in airbags cushion system. At first, the performance of airbags cushion system model is verified experimentally. In airdrop test, accelerometers are fixed in 4 test points distributed over engine mount, top, bottom and side armor plate of hull to obtain acceleration curves with time. The simulation results are obtained under the same conditions of the airdrop test and the simulation results agree very well with the experimental results, which indicate the established model is valid for further optimization. To optimize the parameters of airbags, equivalent response model based on Latin Hypercube DOE and radial basis function is employed instead of the complex finite element model. Then the optimal results based on equivalent response model are obtained using simulated annealing algorithm. After optimization, the maximal acceleration of airborne vehicle landing reduces 19.83%, while the energy absorption by airbags increases 7.85%. The performance of the airbags cushion system thus is largely improved through optimization, which indicates the proposed method has the capability of solving the parameter optimization problem of airbags cushion system for airborne vehicle.展开更多
Layered rock mass is a type of engineering rock mass with sound mechanical anisotropy,which is generally unfavorable to the stability of underground works.To investigate the strength anisotropy of layered rock,the Moh...Layered rock mass is a type of engineering rock mass with sound mechanical anisotropy,which is generally unfavorable to the stability of underground works.To investigate the strength anisotropy of layered rock,the Mohr-Coulomb and Hoek-Brown criteria are introduced to establish the two transverse isotropic strength criteria based on Jaeger's single weak plane theory and maximum axial strain theory,and parameter determination methods.Furthermore,the sensitivity of strength parameters(K 1,K 2,and K 3)that are used to characterize the anisotropy strength of non-sliding failure involved in the strength criteria and confining pressure are investigated.The results demonstrate that strength parameters K 1 and K 2 affect the strength of layered rock samples at all bedding angles except for the bedding angle of 90°and the angle range that can cause the shear sliding failure along the bedding plane.The strength of samples at any bedding angle decreases with increasing K 1,whereas the opposite is for K 2.Except for bedding angles of 0°and 90°and the bedding angle range that can cause the shear sliding along the bedding plane,K 3 has an impact on the strength of rock samples with other bedding angles that the specimens'strength increases with increase of K 3.In addition,the strength of the rock sample increases as confining pressure rises.Furthermore,the uniaxial and triaxial tests of chlorite schist samples were carried out to verify and evaluate the strength criteria proposed in the paper.It shows that the predicted strength is in good agreement with the experimental results.To test the applicability of the strength criterion,the strength data of several types of rock in the literature are compared.Finally,a comparison is made between the fitting effects of the two strength criteria and other available criteria for layered rocks.展开更多
In order to deal with the limitations during the register transfer level verification, a new functional verification method based on the random testing for the system-level of system-on-chip is proposed.The validity o...In order to deal with the limitations during the register transfer level verification, a new functional verification method based on the random testing for the system-level of system-on-chip is proposed.The validity of this method is proven theoretically.Specifically, testcases are generated according to many approaches of randomization.Moreover, the testbench for the system-level verification according to the proposed method is designed by using advanced modeling language.Therefore, under the circumstances that the testbench generates testcases quickly, the hardware/software co-simulation and co-verification can be implemented and the hardware/software partitioning planning can be evaluated easily.The comparison method is put to use in the evaluation approach of the testing validity.The evaluation result indicates that the efficiency of the partition testing is better than that of the random testing only when one or more subdomains are covered over with the area of errors, although the efficiency of the random testing is generally better than that of the partition testing.The experimental result indicates that this method has a good performance in the functional coverage and the cost of testing and can discover the functional errors as soon as possible.展开更多
Signature verification is regarded as the most beneficial behavioral characteristic-based biometric feature in security and fraud protection.It is also a popular biometric authentication technology in forensic and com...Signature verification is regarded as the most beneficial behavioral characteristic-based biometric feature in security and fraud protection.It is also a popular biometric authentication technology in forensic and commercial transactions due to its various advantages,including noninvasiveness,user-friendliness,and social and legal acceptability.According to the literature,extensive research has been conducted on signature verification systems in a variety of languages,including English,Hindi,Bangla,and Chinese.However,the Arabic Offline Signature Verification(OSV)system is still a challenging issue that has not been investigated as much by researchers due to the Arabic script being distinguished by changing letter shapes,diacritics,ligatures,and overlapping,making verification more difficult.Recently,signature verification systems have shown promising results for recognizing signatures that are genuine or forgeries;however,performance on skilled forgery detection is still unsatisfactory.Most existing methods require many learning samples to improve verification accuracy,which is a major drawback because the number of available signature samples is often limited in the practical application of signature verification systems.This study addresses these issues by presenting an OSV system based on multifeature fusion and discriminant feature selection using a genetic algorithm(GA).In contrast to existing methods,which use multiclass learning approaches,this study uses a oneclass learning strategy to address imbalanced signature data in the practical application of a signature verification system.The proposed approach is tested on three signature databases(SID)-Arabic handwriting signatures,CEDAR(Center of Excellence for Document Analysis and Recognition),and UTSIG(University of Tehran Persian Signature),and experimental results show that the proposed system outperforms existing systems in terms of reducing the False Acceptance Rate(FAR),False Rejection Rate(FRR),and Equal Error Rate(ERR).The proposed system achieved 5%improvement.展开更多
With the expansion of network services,large-scale networks have progressively become common.The network status changes rapidly in response to customer needs and configuration changes,so network configuration changes ...With the expansion of network services,large-scale networks have progressively become common.The network status changes rapidly in response to customer needs and configuration changes,so network configuration changes are also very frequent.However,no matter what changes,the network must ensure the correct conditions,such as isolating tenants from each other or guaranteeing essential services.Once changes occur,it is necessary to verify the after-changed network.Whereas,for the verification of large-scale network configuration changes,many current verifiers show poor efficiency.In order to solve the problem ofmultiple global verifications caused by frequent updates of local configurations in large networks,we present a fast configuration updates verification tool,FastCUV,for distributed control planes.FastCUV aims to enhance the efficiency of distributed control plane verification for medium and large networks while ensuring correctness.This paper presents a method to determine the network range affected by the configuration change.We present a flow model and graph structure to facilitate the design of verification algorithms and speed up verification.Our scheme verifies the network area affected by obtaining the change of the Forwarding Information Base(FIB)before and after.FastCUV supports rich network attributes,meanwhile,has high efficiency and correctness performance.After experimental verification and result analysis,our method outperforms the state-of-the-art method to a certain extent.展开更多
Background:Bupleuri Radix is a common Chinese medicinal material in traditional Chinese medicine.Currently,the therapeutic effect of treating schizophrenia is relatively well understood.However,there are fewer studies...Background:Bupleuri Radix is a common Chinese medicinal material in traditional Chinese medicine.Currently,the therapeutic effect of treating schizophrenia is relatively well understood.However,there are fewer studies examining the underlying mechanisms of its treatment.The objective of the study was to investigate the primary mechanisms of Bupleuri Radix in treating schizophrenia through network pharmacology and clinical validation.Method:Network pharmacology revealed possible molecular mechanisms,followed by clinical verification.Sixty-seven schizophrenia patients undergoing treatment at the Hunan Brain Hospital between October and November 2022 were recruited and randomly divided into the olanzapine group and the olanzapine+Bupleuri Radix group.Additionally,32 healthy people undergoing physical examinations during the same period were included as the control group.The patient’s positive and negative symptom scale scores were compared.qPCR was used to detect the mRNA expression levels of ESR1,mTOR,EIF4E,and SMAD4 in peripheral blood.Results:Through network pharmacological analysis,it was concluded in this study that Bupleuri Radix might regulate the mTOR,PI3K-Akt,and HIF-1 signaling pathways.Clinical experiments indicated that compared with before treatment,the positive and negative symptom scale scores and total scores of the two treatment groups were significantly decreased after treatment(P<0.01).In addition,the positive and negative symptom scale scores and total scores in the olanzapine+Bupleuri Radix group were significantly decreased(P<0.01)compared to the olanzapine group after treatment.Before treatment,ESR1 mRNA expression levels in peripheral blood were significantly higher in the two treatment groups than in the control group,whereas the mRNA expression levels of mTOR,EIF4E,and SMAD4 in peripheral blood were significantly lower(P<0.01).The mRNA expression levels of mTOR,EIF4E,and SMAD4 in peripheral blood were significantly higher after therapy than before treatment,whereas the mRNA expression levels of ESR1 in peripheral blood were significantly lower(P<0.01).After therapy,the olanzapine+Bupleuri Radix group’s mRNA expression levels of mTOR,EIF4E,and SMAD4 were significantly higher than those of the olanzapine group,whereas the mRNA expression levels of ESR1 were significantly lower(P<0.01).Conclusion:The mechanism of Bupleuri Radix’s therapeutic efficacy in schizophrenia may involve the up-regulation of mTOR,EIF4E,and SMAD4 mRNA expression and the down-regulation of ESR1 mRNA expression in peripheral blood.展开更多
基金supported in part by the Natural Science Foundation of Jiangsu Province in China under grant No.BK20191475the fifth phase of“333 Project”scientific research funding project of Jiangsu Province in China under grant No.BRA2020306the Qing Lan Project of Jiangsu Province in China under grant No.2019.
文摘In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely correct.Formal verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented correctly.In this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly instructions.The verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations.
文摘Objective:To apply and verify the application of intelligent audit rules for urine analysis by Cui et al.Method:A total of 1139 urine samples of hospitalized patients in Tai’an Central Hospital from September 2021 to November 2021 were randomly selected,and all samples were manually microscopic examined after the detection of the UN9000 urine analysis line.The intelligent audit rules(including the microscopic review rules and manual verification rules)were validated based on the manual microscopic examination and manual audit,and the rules were adjusted to apply to our laboratory.The laboratory turnaround time(TAT)before and after the application of intelligent audit rules was compared.Result:The microscopic review rate of intelligent rules was 25.63%(292/1139),the true positive rate,false positive rate,true negative rate,and false negative rate were 27.66%(315/1139),6.49%(74/1139),62.34%(710/1139)and 3.51%(40/1139),respectively.The approval consistency rate of manual verification rules was 84.92%(727/856),the approval inconsistency rate was 0%(0/856),the interception consistency rate was 12.61%(108/856),and the interception inconsistency rate was 0%(0/856).Conclusion:The intelligence audit rules for urine analysis by Cui et al.have good clinical applicability in our laboratory.
文摘The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules can be translated into machine language and used by autonomous vehicles.In this paper,a translation flow is designed.Beyond the translation,a deeper examination is required,because the semantics of natural languages are rich and complex,and frequently contain hidden assumptions.The issue of how to ensure that digital rules are accurate and consistent with the original intent of the traffic rules they represent is both significant and unresolved.In response,we propose a method of formal verification that combines equivalence verification with model checking.Reasonable and reassuring digital traffic rules can be obtained by utilizing the proposed traffic rule digitization flow and verification method.In addition,we offer a number of simulation applications that employ digital traffic rules to assess vehicle violations.The experimental findings indicate that our digital rules utilizing metric temporal logic(MTL)can be easily incorporated into simulation platforms and autonomous driving systems(ADS).
基金funded by the National Natural Science Foundation of China(62072056,62172058)the Researchers Supporting Project Number(RSP2023R102)King Saud University,Riyadh,Saudi Arabia+4 种基金funded by the Hunan Provincial Key Research and Development Program(2022SK2107,2022GK2019)the Natural Science Foundation of Hunan Province(2023JJ30054)the Foundation of State Key Laboratory of Public Big Data(PBD2021-15)the Young Doctor Innovation Program of Zhejiang Shuren University(2019QC30)Postgraduate Scientific Research Innovation Project of Hunan Province(CX20220940,CX20220941).
文摘Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.
基金supported by National Natural Science Foundation of China(62032003).
文摘Recent advancements in satellite technologies and the declining cost of access to space have led to the emergence of large satellite constellations in Low Earth Orbit(LEO).However,these constellations often rely on bent-pipe architecture,resulting in high communication costs.Existing onboard inference architectures suffer from limitations in terms of low accuracy and inflexibility in the deployment and management of in-orbit applications.To address these challenges,we propose a cloud-native-based satellite design specifically tailored for Earth Observation tasks,enabling diverse computing paradigms.In this work,we present a case study of a satellite-ground collaborative inference system deployed in the Tiansuan constellation,demonstrating a remarkable 50%accuracy improvement and a substantial 90%data reduction.Our work sheds light on in-orbit energy,where in-orbit computing accounts for 17%of the total onboard energy consumption.Our approach represents a significant advancement of cloud-native satellite,aiming to enhance the accuracy of in-orbit computing while simultaneously reducing communication cost.
基金National Natural Science Foundation of China(Grant No.62073227)Liaoning Provincial Science and Technology Department Foundation(Grant No.2023JH2/101300212).
文摘Online Signature Verification (OSV), as a personal identification technology, is widely used in various industries.However, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toaddress these issues, we propose a novel approach for online signature verification, using a one-dimensionalGhost-ACmix Residual Network (1D-ACGRNet), which is a Ghost-ACmix Residual Network that combines convolutionwith a self-attention mechanism and performs improvement by using Ghost method. The Ghost-ACmix Residualstructure is introduced to leverage both self-attention and convolution mechanisms for capturing global featureinformation and extracting local information, effectively complementing whole and local signature features andmitigating the problem of insufficient feature extraction. Then, the Ghost-based Convolution and Self-Attention(ACG) block is proposed to simplify the common parts between convolution and self-attention using the Ghostmodule and employ feature transformation to obtain intermediate features, thus reducing computational costs.Additionally, feature selection is performed using the random forestmethod, and the data is dimensionally reducedusing Principal Component Analysis (PCA). Finally, tests are implemented on the MCYT-100 datasets and theSVC-2004 Task2 datasets, and the equal error rates (EERs) for small-sample training using five genuine andforged signatures are 3.07% and 4.17%, respectively. The EERs for training with ten genuine and forged signaturesare 0.91% and 2.12% on the respective datasets. The experimental results illustrate that the proposed approacheffectively enhances the accuracy of online signature verification.
基金funding from the Basic Research Project of the Education Department of Shaanxi Province(21JC010,21JP035)the Young and Middle-Aged Scientific Research and Innovation Team of the Shaanxi Provincial Administration of Traditional Chinese Medicine(2022SLRHLJ001)the 2023 Central Financial Transfer Payment Local Project“Innovation and Improvement of Five Types of Hospital Preparations,Such as Roumudan Granules”.
文摘Background:The purpose of the study was to investigate the active ingredients and potential biochemical mechanisms of Juanbi capsule in knee osteoarthritis based on network pharmacology,molecular docking and animal experiments.Methods:Chemical components for each drug in the Juanbi capsule were obtained from Traditional Chinese Medicine Systems Pharmacology Database and Analysis Platform,while the target proteins for knee osteoarthritis were retrieved from the Drugbank,GeneCards,and OMIM databases.The study compared information on knee osteoarthritis and the targets of drugs to identify common elements.The data was imported into the STRING platform to generate a protein-protein interaction network diagram.Subsequently,a“component-target”network diagram was created using the screened drug components and target information with Cytoscape software.Common targets were imported into Metascape for GO function and KEGG pathway enrichment analysis.AutoDockTools was utilized to predict the molecular docking of the primary chemical components and core targets.Ultimately,the key targets were validated through animal experiments.Results:Juanbi capsule ameliorated Knee osteoarthritis mainly by affecting tumor necrosis factor,interleukin1β,MMP9,PTGS2,VEGFA,TP53,and other cytokines through quercetin,kaempferol,andβ-sitosterol.The drug also influenced the AGE-RAGE,interleukin-17,tumor necrosis factor,Relaxin,and NF-κB signaling pathways.The network pharmacology analysis results were further validated in animal experiments.The results indicated that Juanbi capsule could decrease the levels of tumor necrosis factor-αand interleukin-1βin the serum and synovial fluid of knee osteoarthritis rats and also down-regulate the expression levels of MMP9 and PTGS2 proteins in the articular cartilage.Conclusion:Juanbi capsule may improve the knee bone microstructure and reduce the expression of inflammatory factors of knee osteoarthritis via multiple targets and multiple signaling pathways.
基金Supported by 2023 Xinjiang Uygur Autonomous Region R&D and Promotion and Application of Key Technologies of CNC Sprayer for Seed Corn(2023NC010).
文摘In conjunction with the working characteristics of the high-clearance wheeled sprayer and the benefits of the closed hydraulic system,a series of reasonable working parameters should be established,and a hydraulic system that fulfills the requisite specifications should be designed.The AMESim software model is employed to construct a closed hydraulic transmission system,and the simulation analysis is then performed according to the data of hydraulic components.According to analysis results,the prototype can be optimized and upgraded,and a verification test is further carried out.The test results demonstrate that the designed closed hydraulic transmission system meets the actual working requirements of the high-clearance wheeled sprayer and provides a stable experimental platform for intelligent control of agricultural machinery.
基金This work was supported in part by the Natural Science Foundation of Jiangsu Province under grant No.BK20191475the fifth phase of“333 Project”scientific research funding project of Jiangsu Province in China under grant No.BRA2020306the Qing Lan Project of Jiangsu Province in China under grant No.2019.
文摘A secure operating system in the communication network can provide the stable working environment,which ensures that the user information is not stolen.The micro-kernel operating system in the communication network retains the core functions in the kernel,and unnecessary tasks are implemented by calling external processes.Due to the small amount of code,the micro-kernel architecture has high reliability and scalability.Taking the microkernel operating system in the communication network prototype VSOS as an example,we employ the objdump tool to disassemble the system source code and get the assembly layer code.On this basis,we apply the Isabelle/HOL,a formal verification tool,to model the system prototype.By referring to the mathematical model of finite automata and taking the process scheduling module as an example,the security verification based on the assembly language layer is developed.Based on the Hoare logic theory,each assembly statement of the module is verified in turn.The verification results show that the scheduling module of VSOS has good functional security,and also show the feasibility of the refinement framework.
基金supported by Health Commission of Sichuan Province(No.19PJ194)。
文摘Objective:To construct a risk prediction model for fall in patients with maintenance hemodialysis(MHD)and to verify the prediction effect of the model.Methods:From June 2020 to December 2020,307 patients who underwent MHD in a tertiary hospital in Chengdu were divided into a fall group(32 cases)and a non-fall group(275 cases).Logistic regression analysis model was used to establish the influencing factors of the subjects.Hosmer–Lemeshow and receiver operating characteristic(ROC)curve were used to test the goodness of fit and predictive effect of the model,and 104 patients were again included in the application research of the model.Results:The risk factors for fall were history of falls in the past year(OR=3.951),dialysis-related hypotension(OR=6.949),time up and go(TUG)test(OR=4.630),serum albumin(OR=0.661),frailty(OR=7.770),and fasting blood glucose(OR=1.141).Hosmer–Lemeshow test was P=0.475;the area under the ROC curve was 0.907;the Youden index was 0.642;the sensitivity was 0.843;and the specificity was 0.799.Conclusions:The risk prediction model constructed in this study has a good effect and can provide references for clinical screening of fall risks in patients with MHD.
基金supported by National Natural Science Foundation of China(No.52107142)。
文摘Plasma jet triggered gas gap switch has obvious advantages in fast control switch.The development of the plasma in the ambient medium is the key factor affecting the triggering conduction of the gas switch.However,the plasma jet process and its characteristic parameters are complicated and the existing test methods cannot fully characterize its development laws.In this work,a two-dimensional transient fluid calculation model of the plasma jet process of the gas gap switch is established based on the renormalization-group k-εturbulence equation.The results show that the characteristic parameters and morphological evolution of the plasma jet are basically consistent with the experimental results,which verifies the accuracy of the simulation model calculation.The plasma jet is a long strip with an initial velocity of 1.0 km·s-1and develops in both axial and radial directions.The jet velocity fluctuates significantly with axial height.As the plasma jet enters the main gap,the pressure inside the trigger cavity drops by80%,resulting in a rapid drop in the jet velocity.When the plasma jet head interacts with the atmosphere,the two-phase fluid compresses each other,generating a forward-propelled pressure wave.The plasma jet heads flow at high velocity,a negative pressure zone is formed in the middle part of the jet,and the pressure peak decreases gradually with height.As the value of the inlet pressure increases,the characteristic parameters of the plasma jet increase.The entrainment phenomenon is evident,which leads to an increase in the pressure imbalance of the atmospheric gas medium,leading to a significant Coanda effect.Compared with air,the characteristic parameters of a plasma jet in SF6are lower,and the morphological evolution is significantly suppressed.The results of this study can provide some insight into the mechanism of action of the switch jet plasma development process.
基金supported by the Tsinghua University 2021 Doctoral Summer Projectsupported by the National Key R&D Program of China (No. 2018YFE0301102)National Natural Science Foundation of China (Nos. 11875020 and 11875023)。
文摘The plasma optical boundary reconstruction technique based on Hommen's theory is promising for future tokamaks with high parameters. In this work, we conduct detailed analysis and simulation verification to estimate the ‘logic loophole' of this technique. The finite-width effect and unpredictable errors reduce the technique's reliability, which leads to this loophole. Based on imaging theory, the photos of a virtual camera are simulated by integrating the assumed luminous intensity of plasma. Based on Hommen's theory, the plasma optical boundary is reconstructed from the photos. Comparing the reconstructed boundary with the one assumed, the logic loophole and its two effects are quantitatively estimated. The finite-width effect is related to the equivalent thickness of the luminous layer, which is generally about 2-4 cm but sometimes larger. The level of unpredictable errors is around 0.65 cm. The technique based on Hommen's theory is generally reliable, but finite-width effect and unpredictable errors have to be taken into consideration in some scenarios. The parameters of HL-2M are applied in this work.
文摘Offline signature verification(OfSV)is essential in preventing the falsification of documents.Deep learning(DL)based OfSVs require a high number of signature images to attain acceptable performance.However,a limited number of signature samples are available to train these models in a real-world scenario.Several researchers have proposed models to augment new signature images by applying various transformations.Others,on the other hand,have used human neuromotor and cognitive-inspired augmentation models to address the demand for more signature samples.Hence,augmenting a sufficient number of signatures with variations is still a challenging task.This study proposed OffSig-SinGAN:a deep learning-based image augmentation model to address the limited number of signatures problem on offline signature verification.The proposed model is capable of augmenting better quality signatures with diversity from a single signature image only.It is empirically evaluated on widely used public datasets;GPDSsyntheticSignature.The quality of augmented signature images is assessed using four metrics like pixel-by-pixel difference,peak signal-to-noise ratio(PSNR),structural similarity index measure(SSIM),and frechet inception distance(FID).Furthermore,various experiments were organised to evaluate the proposed image augmentation model’s performance on selected DL-based OfSV systems and to prove whether it helped to improve the verification accuracy rate.Experiment results showed that the proposed augmentation model performed better on the GPDSsyntheticSignature dataset than other augmentation methods.The improved verification accuracy rate of the selected DL-based OfSV system proved the effectiveness of the proposed augmentation model.
基金the financial support from the National Natural Science Foundation of China(Nos.52374094,52174122 and 52374218)Excellent Youth Fund of Shandong Natural Science Foundation(No.ZR2022YQ49)Taishan Scholar Project in Shandong Province(Nos.tspd20210313 and tsqn202211150)。
文摘The stability control of fissured rock is difficult,especially under static and dynamic loads in deep coal mines.In this paper,the dynamic mechanical properties,strain rate evolution and energy dissipation of fissured and anchored rocks were respectively obtained by SHPB tests.It was found that bolt can provide supporting efficiency-improving effect for fissured rock against dynamic disturbance,and this effect increased quadratically with decrease in anchoring angles.Then,the energy dissipation mechanism of anchored rock was obtained by slipping model.Furthermore,bolt energy-absorbing mechanism by instantaneous tensile-shear deformation was expressed based on material mechanics,which was the larger the anchoring angle,the smaller the energy absorption,and the less the contribution to supporting efficiency improvement.On this basis,the functional relationship between energy dissipation of anchored rock and energy absorption of bolt was established.Taking the coal-gangue separation system of Longgu coal mine as an example,the optimal anchoring angle can be determined as 57.5°–67.5°.Field monitoring showed fissured rock with the optimal anchoring angle,can not only effectively control the deformation,but also fully exert the energy-absorbing and efficiency-improving effect of bolt itself.This study provides guidance to the stability control and supporting design for deep engineering under the same or similar conditions.
文摘Abstract: The major methods to investigate the airbags cushion system are experimental method, thermodynamic method and finite element method (FEM). Airbags cushion systems are very complicated and very difficult to be investigated thoroughly by such methods For experimental method, it is nearly impossible to completely analyze and optimize the cushion characteristics of airbags of airborne vehicle because of charge issue, safety concern and time constraint. Thermodynamic method fails to take the non-linear effects of large airbag deformation and varied contact conditions into consideration. For finite element method, the FE model is usually complicated and the calculation takes tens of hours of CPU time. As a result, the optimization of the design based on a nonlinear model is very difficult by traditional iterative approach method. In this paper, a model based on FEM and control volume method is proposed to simulate landing cushion process of airborne vehicle with airbags cushion system in order to analyze and optimize the parameters in airbags cushion system. At first, the performance of airbags cushion system model is verified experimentally. In airdrop test, accelerometers are fixed in 4 test points distributed over engine mount, top, bottom and side armor plate of hull to obtain acceleration curves with time. The simulation results are obtained under the same conditions of the airdrop test and the simulation results agree very well with the experimental results, which indicate the established model is valid for further optimization. To optimize the parameters of airbags, equivalent response model based on Latin Hypercube DOE and radial basis function is employed instead of the complex finite element model. Then the optimal results based on equivalent response model are obtained using simulated annealing algorithm. After optimization, the maximal acceleration of airborne vehicle landing reduces 19.83%, while the energy absorption by airbags increases 7.85%. The performance of the airbags cushion system thus is largely improved through optimization, which indicates the proposed method has the capability of solving the parameter optimization problem of airbags cushion system for airborne vehicle.
基金the financial support from the National Natural Science Foundation of China(Grant No.51979008)the National Natural Science Foundation of China(Grant No.51779018)the Innovation team of Changjiang River Scientific Research Institute(Grant No.CKSF2021715/YT).
文摘Layered rock mass is a type of engineering rock mass with sound mechanical anisotropy,which is generally unfavorable to the stability of underground works.To investigate the strength anisotropy of layered rock,the Mohr-Coulomb and Hoek-Brown criteria are introduced to establish the two transverse isotropic strength criteria based on Jaeger's single weak plane theory and maximum axial strain theory,and parameter determination methods.Furthermore,the sensitivity of strength parameters(K 1,K 2,and K 3)that are used to characterize the anisotropy strength of non-sliding failure involved in the strength criteria and confining pressure are investigated.The results demonstrate that strength parameters K 1 and K 2 affect the strength of layered rock samples at all bedding angles except for the bedding angle of 90°and the angle range that can cause the shear sliding failure along the bedding plane.The strength of samples at any bedding angle decreases with increasing K 1,whereas the opposite is for K 2.Except for bedding angles of 0°and 90°and the bedding angle range that can cause the shear sliding along the bedding plane,K 3 has an impact on the strength of rock samples with other bedding angles that the specimens'strength increases with increase of K 3.In addition,the strength of the rock sample increases as confining pressure rises.Furthermore,the uniaxial and triaxial tests of chlorite schist samples were carried out to verify and evaluate the strength criteria proposed in the paper.It shows that the predicted strength is in good agreement with the experimental results.To test the applicability of the strength criterion,the strength data of several types of rock in the literature are compared.Finally,a comparison is made between the fitting effects of the two strength criteria and other available criteria for layered rocks.
基金supported by the National High Technology Research and Development Program of China (863 Program) (2002AA1Z1490)Specialized Research Fund for the Doctoral Program of Higher Education (20040486049)the University Cooperative Research Fund of Huawei Technology Co., Ltd
文摘In order to deal with the limitations during the register transfer level verification, a new functional verification method based on the random testing for the system-level of system-on-chip is proposed.The validity of this method is proven theoretically.Specifically, testcases are generated according to many approaches of randomization.Moreover, the testbench for the system-level verification according to the proposed method is designed by using advanced modeling language.Therefore, under the circumstances that the testbench generates testcases quickly, the hardware/software co-simulation and co-verification can be implemented and the hardware/software partitioning planning can be evaluated easily.The comparison method is put to use in the evaluation approach of the testing validity.The evaluation result indicates that the efficiency of the partition testing is better than that of the random testing only when one or more subdomains are covered over with the area of errors, although the efficiency of the random testing is generally better than that of the partition testing.The experimental result indicates that this method has a good performance in the functional coverage and the cost of testing and can discover the functional errors as soon as possible.
文摘Signature verification is regarded as the most beneficial behavioral characteristic-based biometric feature in security and fraud protection.It is also a popular biometric authentication technology in forensic and commercial transactions due to its various advantages,including noninvasiveness,user-friendliness,and social and legal acceptability.According to the literature,extensive research has been conducted on signature verification systems in a variety of languages,including English,Hindi,Bangla,and Chinese.However,the Arabic Offline Signature Verification(OSV)system is still a challenging issue that has not been investigated as much by researchers due to the Arabic script being distinguished by changing letter shapes,diacritics,ligatures,and overlapping,making verification more difficult.Recently,signature verification systems have shown promising results for recognizing signatures that are genuine or forgeries;however,performance on skilled forgery detection is still unsatisfactory.Most existing methods require many learning samples to improve verification accuracy,which is a major drawback because the number of available signature samples is often limited in the practical application of signature verification systems.This study addresses these issues by presenting an OSV system based on multifeature fusion and discriminant feature selection using a genetic algorithm(GA).In contrast to existing methods,which use multiclass learning approaches,this study uses a oneclass learning strategy to address imbalanced signature data in the practical application of a signature verification system.The proposed approach is tested on three signature databases(SID)-Arabic handwriting signatures,CEDAR(Center of Excellence for Document Analysis and Recognition),and UTSIG(University of Tehran Persian Signature),and experimental results show that the proposed system outperforms existing systems in terms of reducing the False Acceptance Rate(FAR),False Rejection Rate(FRR),and Equal Error Rate(ERR).The proposed system achieved 5%improvement.
基金supported by the Fundamental Research Funds for the Central Universities(2021RC239)the Postdoctoral Science Foundation of China(2021 M690338)+3 种基金theHainan Provincial Natural Science Foundation of China(620RC562,2019RC096,620RC560)the Scientific Research Setup Fund of Hainan University(KYQD(ZR)1877)the Program of Hainan Association for Science and Technology Plans to Youth R&D Innovation(QCXM201910)the National Natural Science Foundation of China(61802092,62162021).
文摘With the expansion of network services,large-scale networks have progressively become common.The network status changes rapidly in response to customer needs and configuration changes,so network configuration changes are also very frequent.However,no matter what changes,the network must ensure the correct conditions,such as isolating tenants from each other or guaranteeing essential services.Once changes occur,it is necessary to verify the after-changed network.Whereas,for the verification of large-scale network configuration changes,many current verifiers show poor efficiency.In order to solve the problem ofmultiple global verifications caused by frequent updates of local configurations in large networks,we present a fast configuration updates verification tool,FastCUV,for distributed control planes.FastCUV aims to enhance the efficiency of distributed control plane verification for medium and large networks while ensuring correctness.This paper presents a method to determine the network range affected by the configuration change.We present a flow model and graph structure to facilitate the design of verification algorithms and speed up verification.Our scheme verifies the network area affected by obtaining the change of the Forwarding Information Base(FIB)before and after.FastCUV supports rich network attributes,meanwhile,has high efficiency and correctness performance.After experimental verification and result analysis,our method outperforms the state-of-the-art method to a certain extent.
基金funded by the Key Research and Development Program of Hunan Province(No.2022SK2163)Research Project of Hunan Provincial Health Commission(No.D202319017874,202214052635)+2 种基金Chinese Medicine Science&Research Project of Hunan Province(No.2021045)Natural Science Foundation of Hunan Province,China(No.2023JJ30339,2023JJ60292)grateful for the support by the Institute of Diagnostics of TCM,Hunan University of Chinese Medicine,Changsha,China.
文摘Background:Bupleuri Radix is a common Chinese medicinal material in traditional Chinese medicine.Currently,the therapeutic effect of treating schizophrenia is relatively well understood.However,there are fewer studies examining the underlying mechanisms of its treatment.The objective of the study was to investigate the primary mechanisms of Bupleuri Radix in treating schizophrenia through network pharmacology and clinical validation.Method:Network pharmacology revealed possible molecular mechanisms,followed by clinical verification.Sixty-seven schizophrenia patients undergoing treatment at the Hunan Brain Hospital between October and November 2022 were recruited and randomly divided into the olanzapine group and the olanzapine+Bupleuri Radix group.Additionally,32 healthy people undergoing physical examinations during the same period were included as the control group.The patient’s positive and negative symptom scale scores were compared.qPCR was used to detect the mRNA expression levels of ESR1,mTOR,EIF4E,and SMAD4 in peripheral blood.Results:Through network pharmacological analysis,it was concluded in this study that Bupleuri Radix might regulate the mTOR,PI3K-Akt,and HIF-1 signaling pathways.Clinical experiments indicated that compared with before treatment,the positive and negative symptom scale scores and total scores of the two treatment groups were significantly decreased after treatment(P<0.01).In addition,the positive and negative symptom scale scores and total scores in the olanzapine+Bupleuri Radix group were significantly decreased(P<0.01)compared to the olanzapine group after treatment.Before treatment,ESR1 mRNA expression levels in peripheral blood were significantly higher in the two treatment groups than in the control group,whereas the mRNA expression levels of mTOR,EIF4E,and SMAD4 in peripheral blood were significantly lower(P<0.01).The mRNA expression levels of mTOR,EIF4E,and SMAD4 in peripheral blood were significantly higher after therapy than before treatment,whereas the mRNA expression levels of ESR1 in peripheral blood were significantly lower(P<0.01).After therapy,the olanzapine+Bupleuri Radix group’s mRNA expression levels of mTOR,EIF4E,and SMAD4 were significantly higher than those of the olanzapine group,whereas the mRNA expression levels of ESR1 were significantly lower(P<0.01).Conclusion:The mechanism of Bupleuri Radix’s therapeutic efficacy in schizophrenia may involve the up-regulation of mTOR,EIF4E,and SMAD4 mRNA expression and the down-regulation of ESR1 mRNA expression in peripheral blood.